Definitely a Trustworthy Investment

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Definitely a Trustworthy Investment"

Transcription

1 Definitely a Trustworthy Investment Physical and Logical Security of Conclude s SaaS Solutions 1. Introduction Conclude GmbH offers solutions in a so called Software-as-a-Service (SaaS), meaning Conclude operates the solution on behalf of its customers and the customer only requires a standard PC with Internet access. The Conclude team handles operation of the software solutions, relevant servers, failure protection mechanisms, backups, virus protection and firewall management. The software applications are based on established Internet technologies and have perfected security mechanisms to protect your project data against unauthorized access, sabotage and theft. The Conclude solutions not only offer efficiency and transparency, but also features comprehensive access protection and data security. After all, your project data deserves special protection. Many thousands of users in several hundred projects worldwide rely on the safety and security of our solutions and services. The systems operated by Conclude are located at the high-security computer center KAMP in Oberhausen, Germany, with additional backup at the high-security computer center, myloc in Düsseldorf, Germany only 20 miles from the primary computer center KAMP. The following pages detail the various security aspects, which uniformly apply to PKM, CONTROL, CONOBJECTS, CONTRACE and CONTEMS. Additional issues regarding logical security features within PKM are explained at the end of this paper.

2 2. Physical Security The Conclude servers are operated in Oberhausen at the KAMP computer center, which ranks as one of the most sophisticated co-location computer centers in Europe. Additional backups are managed in the computer center myloc, in Düsseldorf. Access to the Conclude server infrastructure is limited to four full-time employees of Conclude, exclusively. Employees of the computer centers have no access at all. The servers run 24 hours a day 365 days of the year. Guaranteed availability of software, servers, and management averages 99 % in a typical year. KAMP GmbH: Primary computer center KAMP is one of the leading providers of high-availability co-location computer center infrastructures. The KAMP computer center features include: modern gas fire extinguishing systems state-of-the-art access authorization systems including alarm systems and physical security services redundant Internet connection employing backbones from various Internet providers dual power supply and backup power high efficiency, redundant air-conditioning systems consultants. The computer center received an ISO certification in KAMP guarantees the physical security of the computer center by means of a three-stage security system providing surveillance of everything from the grounds outside and various buildings, to the rental spaces where the Conclude servers are located. Dual power supply and backup power supply ensure high level of reliability. KAMP is family owned and managed by 2nd generation of family members. KAMP Netzwerkdienste GmbH Vestische Str Oberhausen Germany All this combined ensures an extremely high level of availability and data security. The high-security areas are constructed as so called Lampertz cells, which are certified by the means of the European fire protection standard ECB-S (F180 / DIN 4102). KAMP is classified as TIER III by third party

3 myloc AG: Backup computer center The world s greatest Lampertz cell constitutes the core of the myloc high-security computer center. The myloc computer center is equipped with: state-of-the-art fire extinguishing systems access authorization systems including alarm systems and physical security services redundant Internet connection employing backbones from various Internet providers dual power supply and backup power supply with an extremely high level of reliability. 3. Technical Security Secure Connection To be able to use our software solutions only a modern web browser is required (e.g. Internet Explorer 7 or higher, Firefox) in which cookies and JavaScript are activated. In addition, uploading and downloading of files by means of the HTTPS protocol must be permitted by the firewall. For data transmission, the tools use the encryption protocol SSL and with the aid of 256 bit encyption, message integrity is guaranteed between the user and the PKM server. After logging in each user is also given a session ID in order to ensure authenticity for the duration of the session. Because of this approach, the exchange of data with the server is much more secure than communication by . myloc is classified but not certified as TIER III by third party consultants. Conclude uses myloc as data center for backups. In the rare case KAMP fails, myloc can act as failover infrastructure within hours. myloc is a subsidiary of United Internet AG, which is listed in the TecDax. myloc managed IT AG Am Gatherhof Düsseldorf Germany Firewall Extensive protection is provided by a firewall. Continuous remote monitoring and updating by our experts ensures optimal protection against attacks from the Internet. Antivirus Software Conclude s software solutions are protected by a professional antivirus product. Updating takes place daily, on an hourly basis in some cases, and thus provides optimal protection against virus attack. All uploaded data is checked before it is stored. In addition, files with the following suffixes can not be uploaded to PKM for security reasons: *.bat, *.cmd, *.com, *.dll, *.exe, *.pif, *.scr, *.vb, *.wsh; however, settings can be customized to meet project-specific require-ments.

4 Logging The logging system records user activity and covers the following: Every successful system login is retained in an auditing-proof manner. The username, date and time are recorded General file accesses (downloads, uploads, relocations) Changes in file names, comments, properties Internal project communication ( s received and sent, etc.) In addition, the activities and changes within the configurations executed by system or project administrators are also logged by the system. 4. Password Protected Access The Conclude project tools are only available to authorized users identified by username and a valid password. Access to PKM is gained solely using encryption. Passwords are saved in the databases using SHA hash functions and cannot be read by anyone as plain text, including higher-level Conclude administration, in plain text. Tool and project specific access rights regulate the user s individual access privileges. Administration Access All the servers in Conclude s infrastructure are solely operated by Conclude and only four Conclude employees have direct access. Only Conclude employees know all infrastructure and application master passwords. Neither KAMP employees nor myloc employees can access the server consoles. Users can be given project-specific administration rights for a project. With projectspecific administration rights a user can only set up and configure his/her particular project. Rights only relate to the respective project and its content. With such projectspecific rights it is not possible to access other projects, meaning it is impossible to read data from third-party projects, administer other projects, or grant oneself administration rights.

5 Access Control and Password Restrictions The creation of participants / users only takes place in agreement with our customer's authorized project leader. Various specifications can be implemented to ensure password complexity including dictonairy tests. In addition, settings can stipulate that the password has to be reset by the user at certain intervals. One can define which accounts may be used by which source IP addresses (IP restrictions). When the user has logged in for the first time, he/she is requested to re-enter the password in order to change it according to the specified criteria. Rejected access attempts are also logged and if an incorrect password is entered several times, access is barred automatically. 5. Backups and Project Archiving Local Backup at KAMP Every backup takes place on dedicated backup servers that are located in a different rack with independent energy supply. All data backups use hard disks and not error prone data storage tapes. Immediately after uploading, the files are copied to the backup. The databases are also backed up incrementally to the backup system every five minutes. A complete backup of the database is performed daily so a consistent state can be restored at any time. Distributed Backup at myloc In addition to the backup in the primary computer center a distributed backup of the database and files is stored in another location the myloc computer center in Düsseldorf. The distributed backup of the files is performed immedi-ately after the local primary backup and the distributed backup of the database is stored as an increment every five minutes. A full-backup of the database is transferred weekly to the distributed backup infrastructure at myloc. Consequently, myloc functions as failover computer center as well.

6 Data Transfer after Project Completion After project completion, the project documents, including meta information, is transferred to a suitable data storage medium. Alternatively the customer can also elect to continue to house project data on the PKM servers for a minimal fee. The basic technical architecture of Conclude s SaaS-infrastructure is as follows:

7 6. Regular Security Tests Conclude undergoes so-called "Penetration Tests" by objective, independent service providers and customers like the European Central Bank (ECB) and Deutsche Bank on a regular basis. Both the external and internal security of PKM is tested and validated. In addition, our ServicePoint assists, and supports and protects the customer at project launch as well as all project participants, throughout the entire term of the project. In nearly all projects, the parties involved agree to use PKM as the legally binding data exchange and communications platform. The entire security test procedure, which is based on German Federal Office for Security in Information Technology standards checks amongst others the following protection mechanisms: Effectiveness of access control and authentication, checking of input fields, and session management with regard to misuse. The regular tests are performed both with and without authorized user accounts, and with the aid of the following attack techniques: Dictionary attack, buffer overflow, SQL-, XSS- and JavaScript injection 7. Logical Security in PKM The internet-based project room PKM networks all those involved in your project and serves as a central project platform. Drawings, documents, and information can be exchanged and managed with PKM securely. Documents cannot be deleted - if a document is uploaded to a folder already containing a file with the same file name or certain parts of the name, a version stack is created. As a result, documents can never be overwritten, replaced or deleted. Versioning of files is used to document the entire course of the project and protect against overwriting. In addition, it is impossible to delete files or remove them from the system. Depending on user permission configuration, documents can be shifted to the "recycle bin" and tagged "invalid", but they can never be completely deleted. It is not even possible for the administrator to empty the recycle bin. Together with the logging system, document versioning ensures that project documentation integrity remains verifiable at any time. Updated: November 2015

Secure Data Hosting. Your data is our top priority.

Secure Data Hosting. Your data is our top priority. Secure Data Hosting Your data is our top priority. ESO s world-class security infrastructure is designed to provide data redundancy, security and availability while keeping sensitive HIPAA and PHI information

More information

Pros 4 Technology Online Backup Features

Pros 4 Technology Online Backup Features Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

SVA Backup Plus Features

SVA Backup Plus Features 1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most

More information

Introduction. Ease-of-Use

Introduction. Ease-of-Use Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016 Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control

More information

Online Backup Solution Features

Online Backup Solution Features CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium

More information

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.

More information

SWANcloud. Security Aspects. SSC-Services GmbH Herrenberger Straße 56 71034 Böblingen Deutschland

SWANcloud. Security Aspects. SSC-Services GmbH Herrenberger Straße 56 71034 Böblingen Deutschland SWANcloud Security Aspects SSC-Services GmbH Herrenberger Straße 56 71034 Böblingen Deutschland SSC-Services GmbH 2014 All rights reserved. Reprinting, reproduction and publication not permitted. Document:

More information

10972-Administering the Web Server (IIS) Role of Windows Server

10972-Administering the Web Server (IIS) Role of Windows Server Course Outline 10972-Administering the Web Server (IIS) Role of Windows Server Duration: 5 days (30 hours) Target Audience: This course is intended for IT Professionals already experienced in general Windows

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

DiamondStream Data Security Policy Summary

DiamondStream Data Security Policy Summary DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers

More information

techsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01

techsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01 techsafe Features Page 1/9 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 5 Security File Compression Encryption Transmission

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

MS 10972A Administering the Web Server (IIS) Role of Windows Server

MS 10972A Administering the Web Server (IIS) Role of Windows Server MS 10972A Administering the Web Server (IIS) Role of Windows Server Description: Days: 5 Prerequisites: This course provides students with the fundamental knowledge and skills to configure and manage Internet

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

SaaS Security for the Confirmit CustomerSat Software

SaaS Security for the Confirmit CustomerSat Software SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Ajera 8 Installation Guide

Ajera 8 Installation Guide Ajera 8 Installation Guide Ajera 8 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

RFG Secure FTP. Web Interface

RFG Secure FTP. Web Interface RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

How To Set Up Dataprotect

How To Set Up Dataprotect How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972A: Administering the Web Server (IIS) Role of Windows Server Course Details Course Outline Module 1: Overview and Installing Internet Information Services In this module students will learn

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide

More information

ITAR Compliant Data Exchange

ITAR Compliant Data Exchange ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/

More information

Security & Infra-Structure Overview

Security & Infra-Structure Overview Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4

More information

EMPOLIS SMART CLOUD. Customized Cloud Services Made in Germany

EMPOLIS SMART CLOUD. Customized Cloud Services Made in Germany EMPOLIS SMART CLOUD Customized Cloud Services Made in Germany EMPOLIS SMART INFORMATION MANAGEMENT The right information, at the right time, to the right person, on the desired device With our unique portfolio

More information

Secure Your Source Code and Digital Assets

Secure Your Source Code and Digital Assets Hosted PRESENTS... Secure Your Source Code and Digital Assets - World's 1st Hosted SCM Solution Studies show that companies of all sizes have begun adopting SaaS (Software as a Service) solutions in a

More information

Tableau Online Security in the Cloud

Tableau Online Security in the Cloud Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Online Backup by Mozy. Common Questions

Online Backup by Mozy. Common Questions Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

SNAP WEBHOST SECURITY POLICY

SNAP WEBHOST SECURITY POLICY SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one

More information

Dooblo SurveyToGo: Security Overview

Dooblo SurveyToGo: Security Overview Dooblo SurveyToGo: Security Overview May, 2012 Written by: Dooblo Page 1 of 10 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...

More information

ACL ANALYTICS. Installation and Activation Guide

ACL ANALYTICS. Installation and Activation Guide ACL ANALYTICS Installation and Overview... 2 Installation and Licensing... 2 Activation... 2 System Requirements... 2 Installing and Activating ACL Analytics... 3 Step 1: Download and Install ACL Analytics...

More information

Online Backup Management Console 3.8 User Manual

Online Backup Management Console 3.8 User Manual Online Backup Management Console 3.8 User Manual September 2010 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Intunex Oy Skillhive Service Description 1 / 6

Intunex Oy Skillhive Service Description 1 / 6 Intunex Oy Skillhive Service Description 1 / 6 About Skillhive Skillhive is a social business application designed for connecting and sharing expertise within organizations. Skillhive enables employees

More information

CBIO Security White Paper

CBIO Security White Paper One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s

More information

The All-in-One Support Solution. Easy & Secure. Secure Advisor

The All-in-One Support Solution. Easy & Secure. Secure Advisor The All-in-One Support Solution. Easy & Secure. Secure Advisor Secure Advisor - A Perfect Solution for Online Support Fast and easy remote support from anywhere Problems that often sound complicated on

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United

More information

Apptix Online Backup by Mozy

Apptix Online Backup by Mozy Apptix Online Backup by Mozy What is Apptix Online Backup by Mozy? Apptix Online Backup by Mozy is a secure online data backup service. It's a simple, smart, and economical way to protect your data from

More information

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com Spreed Keeps Online Meetings Secure Online meeting controls and security mechanism www.spreed.com Spreed Online Meeting is protected by the most advanced security features. Rest assured that your meetings

More information

BroadData Unified Meeting Security Whitepaper v4.2

BroadData Unified Meeting Security Whitepaper v4.2 BroadData Unified Meeting Security Whitepaper v4.2 Introduction As organizations unlock the true potential of meeting over the Web as an alternative to costly and time-consuming travel, they do so in the

More information

LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely

LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Introduction Security is a top priority online it is vital that

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

Security, trust and assurance

Security, trust and assurance Data sheet Security, trust and assurance A closer look at Projectplace safeguards Security: Projectplace protects every bit of your data Trust: Privacy is not dead at Projectplace, your data is yours Assurance:

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) anthonylai@owasp.org Open Web Application Security Project http://www.owasp.org

More information

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99% Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the

More information

The Conference Room of Today. Easy & Secure. Instant Meeting

The Conference Room of Today. Easy & Secure. Instant Meeting The Conference Room of Today. Easy & Secure. Instant Meeting Instant Meeting - The Conference Room of Today Set up and attend meetings easily - from anywhere and at any time Whether for online meetings,

More information

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance GUARDING YOUR BUSINESS BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance www.balabit.com In 2008, the Monetary Authority of Singapore (MAS),

More information

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Xerox DocuShare Private Cloud Service. Security White Paper

Xerox DocuShare Private Cloud Service. Security White Paper Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

WALKME WHITEPAPER. WalkMe Architecture

WALKME WHITEPAPER. WalkMe Architecture WALKME WHITEPAPER WalkMe Architecture Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Ajera 7 Installation Guide

Ajera 7 Installation Guide Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

BackupAgent Management Console 4.0.1 User Manual

BackupAgent Management Console 4.0.1 User Manual BackupAgent Management Console 4.0.1 User Manual May 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes

More information

How to Use the File Transfer (FTP) Service

How to Use the File Transfer (FTP) Service How to Use the File Transfer (FTP) Service How to Use the File Transfer (FTP) Service...1 What is a File Transfer Service?...2 First Steps...2 How to Upload Files to the File Transfer Service...2 How to

More information

Oracle Enterprise Manager. Description. Versions Supported

Oracle Enterprise Manager. Description. Versions Supported Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft SQL Server Release 10 (4.0.3.1.0) E14811-03 June 2009 This document provides a brief description about the Oracle System

More information

LBSEC. http://www.liveboxcloud.com

LBSEC. http://www.liveboxcloud.com 2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee

More information

SaaS Security for Confirmit Horizons

SaaS Security for Confirmit Horizons SaaS Security for Confirmit Horizons January 2015 Confirmit Horizons v18.5 Arnt Feruglio Chief Operating Officer The Confirmit Horizons Software From its inception in 1997, the architecture and code of

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States

More information

Blue Jeans Network Security Features

Blue Jeans Network Security Features Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users

More information

Oracle Enterprise Manager. Description. Versions Supported

Oracle Enterprise Manager. Description. Versions Supported Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft SQL Server Release 12 (4.1.3.2.0) E18740-01 November 2010 This document provides a brief description about the Oracle

More information

White paper inforouter in the Life Sciences Industry: 21 CFR Part 11 Compliance

White paper inforouter in the Life Sciences Industry: 21 CFR Part 11 Compliance White paper inforouter in the Life Sciences Industry: 21 CFR Part 11 Compliance Overview of 21 CFR Part 11 The final version of the 21 CFR Part 11 regulation released by the FDA in 1997 provides a framework

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Paxera Uploader Basic Troubleshooting

Paxera Uploader Basic Troubleshooting Before going further, please check the logs and auto-route queue in the Uploader Control, these logs will say a lot about your problem. You should take care of the following before contacting our Support

More information

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008 Integration Guide Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008 Integration Guide: Microsoft Active Directory Rights Management Services (AD RMS) Imprint

More information

Xopero Backup Build your private cloud backup environment. Getting started

Xopero Backup Build your private cloud backup environment. Getting started Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...

More information

Contents. Using Web Access... 1. Managing Shared Folders... 28. Managing Account Settings... 36. Index... 39

Contents. Using Web Access... 1. Managing Shared Folders... 28. Managing Account Settings... 36. Index... 39 Contents Using Web Access... 1 Using the Sign In Page... 1 Signing In to Seagate Global Access... 2 Creating a Seagate Global Access Account... 2 If You Forget Your Password... 5 Viewing Central Axis Details...

More information

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

THE SECURITY OF HOSTED EXCHANGE FOR SMBs THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available

More information

Business process efficiency is improved with task management, alerts, notifications and automated process workflows.

Business process efficiency is improved with task management, alerts, notifications and automated process workflows. UNCLASSIFIED 23/02/2015 v3.3 Cobweb Hosted SharePoint 3.0 Service Description Cobweb Hosted SharePoint is a web-based document collaboration tool that helps you maximise productivity in a truly flexible,

More information

Sophisticated Password Policy

Sophisticated Password Policy Hosted PRESENTS... Secure Your Source Code Studies show that companies of all sizes have begun adopting SaaS (Software as a Service) solutions in a faster pace as a way to implement IT services more quickly

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

SaaS - Document Management Projects ProductInfo 1. Document Management Projects. Benefits

SaaS - Document Management Projects ProductInfo 1. Document Management Projects. Benefits SaaS - Document Management Projects Product Info Document Management Projects The DocuWare document management system is available as Software as a Service (SaaS) with complete functionality, in addition

More information

10972B: Administering the Web Server (IIS) Role of Windows Server

10972B: Administering the Web Server (IIS) Role of Windows Server 10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA.

PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA. PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA Milan Paroški 1, Nenad Petrović, Rade Ćirić 2 1 Provincial Authorities Administrative

More information

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Security. Enalyzer A/S

Security. Enalyzer A/S Enalyzer A/S Security At Enalyzer we do our outmost to keep our customer s data safe and our web-based survey systems accessible at any time. Our high level of performance, availability and security are

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

Security Features 01/01/2014

Security Features 01/01/2014 Security Features 01/01/2014 Introduction ArkadinAnywhere is Arkadin s easy-to-use web collaboration service that helps improve internal and external communication processes, thereby enabling employees

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information